[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yina et al., 2022 - Google Patents

Discussion on computer network security technology and firewall technology

Yina et al., 2022

View PDF
Document ID
252427122314756259
Author
Yina Q
et al.
Publication year
Publication venue
International Journal of New Developments in Engineering and Society

External Links

Snippet

With the continuous development of computer technology, network technology is deeply integrated into all aspects of society, and people's daily work, study and life have undergone tremendous changes. However, people also gradually realize that with the development of …
Continue reading at francis-press.com (PDF) (other versions)

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99939Privileged access
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
CN110198297A (en) Data on flows monitoring method, device, electronic equipment and computer-readable medium
Yina Discussion on computer network security technology and firewall technology
Rashid et al. Trust system architecture for securing GOOSE communication in IEC 61850 substation network
Zhang et al. VOIP voice network technology security strategies
CN116318868A (en) Cross-browser bill roaming method
CN109120619A (en) A kind of computer network communications system
Anandappa et al. Cloud computing and security issues in the cloud
Wu The problems in campus network information security and its solutions
TWM602225U (en) Information security blind spot detection system for normal network behavior
Singh et al. A hybrid model for cyberspace security
Tang et al. Research on security protection countermeasures of internet of things
Xia et al. Research on the Application of Data Encryption Technology in Computer Network Communication Security
Zhang Research of Campus Network Information Security
Li Data and Information Security Technology in Network Communication
Liu Research on Core Technology Based on Computer Information System Security Architecture
Kong et al. Industrial Internet edge computing security risk analysis and protection research
Yi The Network Security Analysis System Design Based on B/S Structure: An Approach Research
Yu Study on intrusion IPv6 detection system on LINUX
Zhao Research on Database Information Transmission Security Protection System under Computer Big Data Technology
Yang et al. Security Risk Analysis of On-Site Terminal of Marketing Specialty in Power Industry under the Environment of Internet of Things
YanWei et al. Research on Power Enterprise Network Security Solution
CN118199943A (en) High-expansibility network security host
Zhou et al. The Firewall Rule Authentication Method Based on 6to4 Tunnel
Zou et al. Research on Security Risk Analysis and Protective Measures of Power Internet of Things
Ma et al. Information security protection in hybrid office